This is neither a flaw nor news. Any unencrypted volume on <i>any</i> system is subject to being read if the volume is mounted elsewhere.<p>Additionally, this requires physical access to and control of the machine. As anyone in security will tell you, when someone has physical control of a machine, all bets are off.